Unit 42 experts notified about increasing number of attacks on Oracle WebLogic servers. Criminals exploit…
As a decoy, the attackers used a copy of a certain blockchain blog entry in which they embedded a hidden frame to load a malicious page.
Capesand code turned out to be very primitive in comparison with other exploit packs.
“The Capesand exploit kit’s code is quite simple compared with other kits. Almost all of Capesand‘s functions reuse open-source code, including the exploits, obfuscation, and packing techniques. Further monitoring revealed that its users are actively using it despite its seemingly unfinished state”, — reported researchers.
Its authors took as a basis the long-standing open-source project Demon Hunter, from which they borrowed almost all techniques, including the embedding of malicious codes, its obfuscation and packaging.
At the same time, the plagiarists upgraded malware by including new exploits in their package.
Researchers found in the Capesand arsenal two exploits for Adobe Flash (CVE-2018-4878 and CVE-2018-15982) and two for IE (CVE-2018-8174 and CVE-2019-0752). The latter was first seen in real attacks last summer – at that time, the attackers used a new exploit to implement the SLUB backdoor through two sites using the watering hole method.
Further monitoring of Capesand’s attacks showed that it also exploited another vulnerability in IE – CVE-2015-2419, and the source code CVE-2019-0752 specified in the source code is not yet used. Apparently, the authors of the new tool have not yet managed to integrate all the exploits that they plan to use.
It is noteworthy that Capesand code on the client side does not contain exploits, but calls for them on its server using the API. In the request, it indicates the name of the exploit, its URL (from the configuration file), the victim’s IP address, and User Agent data. All this information is encrypted with the specified AES key, which the server checks before giving the payload.
After completing the exploit, the mess.exe file is downloaded to the victim’s machine; during testing, an attempt was also made to exploit the vulnerability CVE-2018-8120 to increase privileges on Windows. Following this was the execution of njcrypt.exe – a repeatedly obfuscated application on .NET responsible for delivering the target malware. In the case of Trend Micro, it turned out to be njRAT version 0.7d.
Pbmsoultions.com is a domain that tries to trick you into clik to its browser notifications…
Prizestash.com is a site that tries to trick you into subscribing to its browser notifications…
Verifiedbreaking.com is a domain that tries to force you into subscribing to its browser notifications…
Themoneyminutes.com is a domain that tries to force you into subscribing to its browser notifications…
News-xcidizi.com is a domain that tries to trick you into clik to its browser notifications…
Everytraffic-flow.com is a domain that tries to trick you into subscribing to its browser notifications…